[Secure-testing-commits] r2464 - / data data/CVE data/DSA tsck

Joey Hess joeyh at costa.debian.org
Wed Oct 19 23:18:03 UTC 2005


Author: joeyh
Date: 2005-10-19 23:17:58 +0000 (Wed, 19 Oct 2005)
New Revision: 2464

Modified:
   TODO
   data/CVE/list
   data/DSA/list
   data/README
   data/resources
   tsck/tsck.py
Log:
misc other CAN references, should be complete now except for the python
code


Modified: TODO
===================================================================
--- TODO	2005-10-19 23:12:59 UTC (rev 2463)
+++ TODO	2005-10-19 23:17:58 UTC (rev 2464)
@@ -39,7 +39,7 @@
 
 * Create a repo of security patches
 
-* Add user tags to security bugs to add a CAN number and a "tracked" for each analyzed
+* Add user tags to security bugs to add a CVE number and a "tracked" for each analyzed
   security bug. 
 
 * Retroactive updating of the list for not-affected and others

Modified: data/CVE/list
===================================================================
--- data/CVE/list	2005-10-19 23:12:59 UTC (rev 2463)
+++ data/CVE/list	2005-10-19 23:17:58 UTC (rev 2464)
@@ -5345,7 +5345,7 @@
 	- websieve <unfixed> (bug #311838; low)
 	NOTE: second half of bug suggets lack of escaping of user data
 	NOTE: could be used to compromise program somehow
-	NOTE: that is not covered by the CAN though due to vagueness
+	NOTE: that is not covered by the CVE though due to vagueness
 CVE-2005-1840 (Directory traversal vulnerability in class.layout_phpcms.php in phpCMS ...)
 	NOT-FOR-US: phpCMS
 CVE-2005-1839 (Multiple SQL injection vulnerabilities in Doug Luxem Liberum Help Desk ...)
@@ -10151,8 +10151,8 @@
 CVE-2004-1575 (The XML parser in Xerces-C++ 2.5.0 allows remote attackers to cause a ...)
 	- xerces25 2.5.0-4
 	- xerces24 2.4.0-4
-	NOTE: maintainer believe that this CAN doesn't apply to xerces23 (see bug #296432)
-	NOTE: maintainer believe that this CAN doesn't apply to xerces21 (see bug #296466)
+	NOTE: maintainer believe that this CVE doesn't apply to xerces23 (see bug #296432)
+	NOTE: maintainer believe that this CVE doesn't apply to xerces21 (see bug #296466)
 CVE-2004-1574 (Buffer overflow in Vypress Messenger 3.5.1 and earlier allows remote ...)
 	NOT-FOR-US: Vypress
 CVE-2004-1573 (The documentation for AJ-Fork 167 implies that users should set ...)
@@ -12689,7 +12689,7 @@
 	RESERVED
 CVE-2004-0994 (Multiple integer overflows in xzgv 0.8 and earlier allow remote ...)
 	{DSA-614-1}
-	NOTE: only indication that it's this CAN is in the debian package changelog
+	NOTE: only indication that it's this CVE is in the debian package changelog
 	- xzgv 0.8-3
 CVE-2004-0993 (Buffer overflow in hpsockd before 0.6 allows remote attackers to cause ...)
 	{DSA-604-1}
@@ -12741,7 +12741,7 @@
 CVE-2004-0975 (The der_chop script in the openssl package in Trustix Secure Linux 1.5 ...)
 	{DSA-603-1}
 	- openssl 0.9.7e-3
-	NOTE: also includes other security fixes than this CAN
+	NOTE: also includes other security fixes than this CVE
 CVE-2004-0974 (The netatalk package in Trustix Secure Linux 1.5 through 2.1, and ...)
 	NOTE: local; low
 	- netatalk 1.6.4a-1
@@ -14022,7 +14022,7 @@
 	{DSA-518}
 CVE-2004-0410
 	RESERVED
-	NOTE: An empty CAN, never published.
+	NOTE: An empty CVE, never published.
 CVE-2004-0409 (Stack-based buffer overflow in the Socks-5 proxy code for XChat 1.8.0 ...)
 	{DSA-493}
 	- xchat 2.0.8-1

Modified: data/DSA/list
===================================================================
--- data/DSA/list	2005-10-19 23:12:59 UTC (rev 2463)
+++ data/DSA/list	2005-10-19 23:17:58 UTC (rev 2464)
@@ -919,7 +919,7 @@
 [19 Jan 2005] DSA-645-1 cupsys - buffer overflow
 	{CVE-2005-0064}
 	NOTE: cupsys not affected in sarge, though other programs are vulnerable
-	NOTE: see CAN/list
+	NOTE: see CVE/list
 	NOTE: not fixed in testing at time of DSA
 [18 Jan 2005] DSA-644-1 chbg - buffer overflow
 	{CVE-2004-1264}
@@ -1075,11 +1075,11 @@
 	- openssl 0.9.7e-3
 [29 Nov 2004] DSA-602-1 libgd2 - integer overlow
 	{CVE-2004-0941 CVE-2004-0990}
-	NOTE: different from fixes from earlier DSA for these CANs; 2004-0941 new
+	NOTE: different from fixes from earlier DSA for these CVEs; 2004-0941 new
 	- libgd2 2.0.33-1.1
 [29 Nov 2004] DSA-601-1 libgd1 - integer overflow
 	{CVE-2004-0941 CVE-2004-0990}
-	NOTE: different from fixes from earlier DSA for these CANs; 2004-0941 new
+	NOTE: different from fixes from earlier DSA for these CVEs; 2004-0941 new
 	- libgd 1.8.4-36.1
 [25 Nov 2004] DSA-599-1 tetex-bin - integer overflows
 	{CVE-2004-0888}
@@ -2363,7 +2363,7 @@
 	- tcpdump 3.7.2-1
 [10 Dec 2002] DSA-205 gtetrinet - buffer overflow
 	- gtetrinet 0.4.4-1
-	NOTE: no CAN not CVE for this one
+	NOTE: no CVE for this one
 [05 Dec 2002] DSA-204 kdelibs - arbitrary program execution
 	{CVE-2002-1281 CVE-2002-1282}
 	- kdelibs 4:3.1.0-1
@@ -2419,14 +2419,14 @@
 	{CVE-2001-0131 CVE-2002-1233}
 	- apache 1.3.27-1
 	TODO: CVE-2002-0843 appears to be listed twice in this DSA
-	TODO: (once with NO-CAN)
+	TODO: (once with NO-CVE)
 [04 Nov 2002] DSA-187 apache - several vulnerabilities
 	{CVE-2002-0839 CVE-2002-0840 CVE-2002-0843}
 	- apache 1.3.27-0.1
 	{CVE-2001-0131 CVE-2002-1233}
 	- apache 1.3.27-1
 	TODO: CVE-2002-0843 appears to be listed twice in this DSA
-	TODO: (once with NO-CAN)
+	TODO: (once with NO-CVE)
 [01 Nov 2002] DSA-186 log2mail - buffer overflow
 	{CVE-2002-1251}
 	- log2mail 0.2.6-1

Modified: data/README
===================================================================
--- data/README	2005-10-19 23:12:59 UTC (rev 2463)
+++ data/README	2005-10-19 23:17:58 UTC (rev 2464)
@@ -29,7 +29,7 @@
 	description, put it in square brackets instead.
 {id id id}
 	This is used to link to other ids that describe the same hole.
-	Generally used to link DSAs to CAN's and CVEs and back.
+	Generally used to link DSAs to CVEs and back.
 UPCASE
 	Any word in upper case, typically NOTE, HELP, TODO, RESERVED,
 	REJECTED, NOT-FOR-US.

Modified: data/resources
===================================================================
--- data/resources	2005-10-19 23:12:59 UTC (rev 2463)
+++ data/resources	2005-10-19 23:17:58 UTC (rev 2464)
@@ -1,8 +1,7 @@
-Full CAN and CVE lists:
-http://cve.mitre.org/cve/candidates/downloads/full-can.html
-http://cve.mitre.org/cve/downloads/full-cve.html
+Full CVE lists:
+http://www.cve.mitre.org/cve/downloads/
 
-CANs that do not affect sarge (maintained by regular security team):
+CVEs that do not affect sarge (maintained by regular security team):
 http://www.debian.org/security/nonvulns-sarge
 
 Ultra Monkey kernel security database:

Modified: tsck/tsck.py
===================================================================
--- tsck/tsck.py	2005-10-19 23:12:59 UTC (rev 2463)
+++ tsck/tsck.py	2005-10-19 23:17:58 UTC (rev 2464)
@@ -94,7 +94,7 @@
 print "Generating system-specific security overview for " + suite
 
 for i in vulns:
-    if i.startswith("CAN-"):
+    if i.startswith("CVE-"):
 
         if len(cve) > 0 and len(pkg_name) > 0:
             if source_packages.has_key(pkg_name):




More information about the Secure-testing-commits mailing list